Search Results - (( _ processing protocol algorithm ) OR ( java application system algorithm ))
Search alternatives:
- protocol algorithm »
- java application »
- system algorithm »
- processing »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Moreover, UOCC system has been extended to online environment via Wi-Fi which utilizes Transmission Control Protocol (TCP) Socket in Java which used the PC as server to create socket thus establishing bind connection between UOCC RM mobile phone and the UOCC system, allowing users to remotely monitor the machining process on mobile platform. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…In order to improve security, a proper algorithm should be implemented in the three-pass protocol by adding phases at starting and ending of the process. …”
Get full text
Get full text
Student Project -
8
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
9
-
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
-
12
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
13
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…This allows programmers to enhance existing protocols or deploy new protocols. AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
Get full text
Get full text
Get full text
Article -
14
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The performance results showed that LUPQ is the most suitable encoding algorithm for the DF protocol relay system using LDPC code as it performs low processing time of the LDPC encoder component.…”
Get full text
Get full text
Get full text
Thesis -
15
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
16
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
17
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
18
Encryption selection for WLAN IEEE802.11G
Published 2013“…It also showed that DES algorithm produced the best time success along with WEP encryption protocol. …”
Get full text
Get full text
Thesis -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis
